SIP-level confidentiality protection
a confidentiality protection and IP-level technology, applied in the field of IP-level confidentiality protection, can solve the problems of end-to-end encryption of sip messages, request or response,
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0017] Referring to FIGS. 1 and 2, a user equipment (UE) 10 registers with a network element such as a proxy-Call Session Control Function (P-CSCF) 20 in a visiting network 100 before starting a session. In FIG. 1, the UE 10 is depicted as a mobile phone, however the UE 10 may comprise any user device capable of participating in a session such as a mobile phone, a personal digital assistant (PDA), a portable computer, or a desktop computer. Furthermore, the UE 10 may register with a P-CSCF in a home network of the UE depending on where the UE 10 is located. During registration, the visiting network 100 contacts the home subscriber server (HSS) 30 in the home network 200 of the UE 10 and determines with the UE 10 what algorithms and keys will be used for the registration period. As shown in the timing diagram of FIG. 2, the UE 10 initiates the registration by sending a registration message SM1 to the P-CSCF 20 in the visiting network 100. The home network 200 is then contacted by the...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com